Free CISA Exam Braindumps (page: 21)

Page 21 of 457

The PRIMARY focus of a post-implementation review is to verify that:

  1. enterprise architecture (EA) has been complied with.
  2. user requirements have been met.
  3. acceptance testing has been properly executed.
  4. user access controls have been adequately designed.

Answer(s): B



Which of the following BEST protects an organization's proprietary code during a joint-development activity involving a third party?

  1. Privacy agreement
  2. Statement of work (SOW)
  3. Nondisclosure agreement (NDA)
  4. Service level agreement (SLA)

Answer(s): C



During which process is regression testing MOST commonly used?

  1. Unit testing
  2. System modification
  3. Stress testing
  4. Program development

Answer(s): B



Which of the following should be of GREATEST concern to an IS auditor reviewing a network printer disposal process?

  1. Business units are allowed to dispose printers directly to authorized vendors.
  2. Inoperable printers are stored in an unsecured area.
  3. Disposal policies and procedures are not consistently implemented.
  4. Evidence is not available to verify printer hard drives have been sanitized prior to disposal.

Answer(s): D






Post your Comments and Discuss ISACA CISA exam with other Community members:

CISA Exam Discussions & Posts